Analysis
-
max time kernel
69s -
max time network
71s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 15:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://todoentrada.com
Resource
win10v2004-20240226-en
General
-
Target
http://todoentrada.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133560285848553593" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5064 chrome.exe 5064 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe Token: SeShutdownPrivilege 5064 chrome.exe Token: SeCreatePagefilePrivilege 5064 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe 5064 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5064 wrote to memory of 4848 5064 chrome.exe 88 PID 5064 wrote to memory of 4848 5064 chrome.exe 88 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 4028 5064 chrome.exe 90 PID 5064 wrote to memory of 736 5064 chrome.exe 91 PID 5064 wrote to memory of 736 5064 chrome.exe 91 PID 5064 wrote to memory of 2340 5064 chrome.exe 92 PID 5064 wrote to memory of 2340 5064 chrome.exe 92 PID 5064 wrote to memory of 2340 5064 chrome.exe 92 PID 5064 wrote to memory of 2340 5064 chrome.exe 92 PID 5064 wrote to memory of 2340 5064 chrome.exe 92 PID 5064 wrote to memory of 2340 5064 chrome.exe 92 PID 5064 wrote to memory of 2340 5064 chrome.exe 92 PID 5064 wrote to memory of 2340 5064 chrome.exe 92 PID 5064 wrote to memory of 2340 5064 chrome.exe 92 PID 5064 wrote to memory of 2340 5064 chrome.exe 92 PID 5064 wrote to memory of 2340 5064 chrome.exe 92 PID 5064 wrote to memory of 2340 5064 chrome.exe 92 PID 5064 wrote to memory of 2340 5064 chrome.exe 92 PID 5064 wrote to memory of 2340 5064 chrome.exe 92 PID 5064 wrote to memory of 2340 5064 chrome.exe 92 PID 5064 wrote to memory of 2340 5064 chrome.exe 92 PID 5064 wrote to memory of 2340 5064 chrome.exe 92 PID 5064 wrote to memory of 2340 5064 chrome.exe 92 PID 5064 wrote to memory of 2340 5064 chrome.exe 92 PID 5064 wrote to memory of 2340 5064 chrome.exe 92 PID 5064 wrote to memory of 2340 5064 chrome.exe 92 PID 5064 wrote to memory of 2340 5064 chrome.exe 92
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://todoentrada.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x10c,0x110,0x114,0x108,0x118,0x7ffd5a1c9758,0x7ffd5a1c9768,0x7ffd5a1c97782⤵PID:4848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 --field-trial-handle=1876,i,15648731116249223709,12681788553891384916,131072 /prefetch:22⤵PID:4028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=1876,i,15648731116249223709,12681788553891384916,131072 /prefetch:82⤵PID:736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2204 --field-trial-handle=1876,i,15648731116249223709,12681788553891384916,131072 /prefetch:82⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2888 --field-trial-handle=1876,i,15648731116249223709,12681788553891384916,131072 /prefetch:12⤵PID:3428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2920 --field-trial-handle=1876,i,15648731116249223709,12681788553891384916,131072 /prefetch:12⤵PID:2076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4468 --field-trial-handle=1876,i,15648731116249223709,12681788553891384916,131072 /prefetch:12⤵PID:808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4880 --field-trial-handle=1876,i,15648731116249223709,12681788553891384916,131072 /prefetch:82⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4904 --field-trial-handle=1876,i,15648731116249223709,12681788553891384916,131072 /prefetch:82⤵PID:4792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3308 --field-trial-handle=1876,i,15648731116249223709,12681788553891384916,131072 /prefetch:12⤵PID:5624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 --field-trial-handle=1876,i,15648731116249223709,12681788553891384916,131072 /prefetch:82⤵PID:5996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4772 --field-trial-handle=1876,i,15648731116249223709,12681788553891384916,131072 /prefetch:12⤵PID:6092
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD55473322797c028fd797bf731688393a3
SHA12c11c002a89f0634b243d2f7ae0d359204b374cd
SHA2560868b45998e58227c641b6e80987a637c164470c2b6847625ecf4853df21e701
SHA5124b69e4596c990028bc3a4384c3bfb05b1d610f3504c3188e36ce9c0abf4f95f790c468e2f5ba150e4cb4cbcdd617bb3bee1113f89456a0b3d7e6e5ce293d4c3a
-
Filesize
536B
MD5ba6bd6211b166d9eeb095a7a9d968996
SHA1c2523c58045c31b681c65c7802ea8c73f2d179eb
SHA2566cb29d107a6dbcfaf2610d3e0cbf99b6f750e7198b00f8af40a644517a977390
SHA51270b823e55c39e343f4da6326b79a9be9ca306dd9736c5bea310e918e95766715bcd6fb7316809404993f719d2e9131a6640df2fb52fac0b64179a9f0facf60d6
-
Filesize
6KB
MD5d500407d426d2ae86a10ec7bfd6a9eed
SHA1e6b5901f889fda30e2b803c3795b3fc326be521b
SHA256b0798768df6706d54ee76ed798e0c0bea12c9198a8c04cf2d1ba455a2812cfcc
SHA5129e3b9789caa381f6e21198c39b7a520e6d298d157e4439732140276d696fc994c36dfb85317b4f00f15603bb17a8919a9101f7a4f7363560aeda30e910741c63
-
Filesize
6KB
MD5be2a7ae1e88177a09406555cb3b525e1
SHA1528dcb5ff0fe844bd6ad4b18cee65b40c179e463
SHA2567b1f40959dd80fb089682cd153e115e7dab4335dcccad4c1609014a23f176835
SHA512ce74ef22ff05b23abcc719c98ee49960f85214e6971909b8c07f6c130c48477f8e3703d46f30b2b6458df4dbccc0d6b3d4aa92e76f300d33138834e8c9e3db6f
-
Filesize
253KB
MD507dbd471097461ef1fcec50416f179af
SHA1be3fc35aaa23e3947c20835db967a78682e631f0
SHA25602a5903862111db4bdc2e3fb5b05a1fab76ab952354bf5dac5c7a387d41f1f47
SHA512cf9a5c8bc0d17d9ba727fcb41e97e0ee7529bc235aa6714df88ace0d3ae263e0e1964a7707052b0dc7df52281ae34db35318be3d85e4dfa581020119a07e1d6f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd